General

  • Target

    8021596186.zip

  • Size

    3.0MB

  • Sample

    220926-xg1r5schcn

  • MD5

    1c029207939ae2ec1e17756cd41931d1

  • SHA1

    bd09f38f4f922f1ba7c69f561f310bd3775fd076

  • SHA256

    5c21370a49041a16320ee454120c256e07a54315af81c9a6e6e7f9c3be7fe0bf

  • SHA512

    716b883963f1d39e93defbe205aa38698fe5500f91851576d1da79f4d2ee05d3c5aeb2bb365c17a5dc1e4e58384c9509c2ef9ed031378d830da8b89cb7f27181

  • SSDEEP

    98304:GtMKESMEc4lOKJPuMCeEtJOPffoXllHdc:MM/zEDQKhRCPDXXrdc

Malware Config

Extracted

Family

bitrat

Version

1.38

C2

ckjruifbnswdcy.con-ip.com:1880

Attributes
  • communication_password

    202cb962ac59075b964b07152d234b70

  • install_dir

    AppData

  • install_file

    Discord.exe

  • tor_process

    tor

Targets

    • Target

      38ac6284a88ccb4ee40212a22c2575bb90f719c6dad952c23a286759f1108c80

    • Size

      3.4MB

    • MD5

      aa460dc0cf6a357b45f66e9f7ef535c1

    • SHA1

      fa4130f40cff7890b1773beec8fdc9132b76c69d

    • SHA256

      38ac6284a88ccb4ee40212a22c2575bb90f719c6dad952c23a286759f1108c80

    • SHA512

      bd403d094fb9f2b72cc254e9db2d2c841d0e46fe19334bba139d53c4087001d3d0e5ab716b86076710f592abe9f18ae4413a10eaa46c828242ccf16107bf0073

    • SSDEEP

      98304:nmN2t+apaCv1Y6nyTsigAJ2FT8zd/oV2V:mN2gANrny7jJHh/q2V

    • BitRAT

      BitRAT is a remote access tool written in C++ and uses leaked source code from other families.

    • Detects BitRAT RAT

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Adds Run key to start application

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v6

Tasks